Any type of security–based systems is subjective to being targeted. SCADA is no
exception. SCADA is supervisory control and data acquisition. According to the SCADA
Systems article, it “refers to ICS (Industrial control systems) used to control infrastructure
processes, facility–based processes, or industrial processes”. SCADA systems allow users
to make informative decisions to make sure the infrastructure and operations are safe. One
of the biggest threats is access to software that wasn’t authorized for anyone to use. That
can include persons or computer viruses. Data access to networks that is sent to SCADA
devices is another threat. There is little to no security with sending data so whatever person
that sends it, has all control over it. VPN is an option that SCADA users believe will help
keep the network protected, but at the same time there are ways to bypass the security
network on SCADA devices.
exception. SCADA is supervisory control and data acquisition. According to the SCADA
Systems article, it “refers to ICS (Industrial control systems) used to control infrastructure
processes, facility–based processes, or industrial processes”. SCADA systems allow users
to make informative decisions to make sure the infrastructure and operations are safe. One
of the biggest threats is access to software that wasn’t authorized for anyone to use. That
can include persons or computer viruses. Data access to networks that is sent to SCADA
devices is another threat. There is little to no security with sending data so whatever person
that sends it, has all control over it. VPN is an option that SCADA users believe will help
keep the network protected, but at the same time there are ways to bypass the security
network on SCADA devices.
To mitigate risks and to protect from cyber threats, organizations need to take on a
more cautious approach that involves “threat intelligence”. To get a hold of threat
intelligence, organizations can be more prepared and ahead of oncoming threats. They are
also able to understand the different strategies used by cybercriminals and put in place
different security measures.
Dixon, M. (2024, October 27). SCADA systems and Cyber Threats: A threat intelligence
approach. CyberIntelInsights.com. https://www.cyberintelinsights.com/industries/scada–
systems–cyber–threats–threat/
SCADA systems. SCADA Systems. (n.d.). https://www.scadasystems.net/